Most RISC processors do not include a block move instruction. What are the advantages and disadvantages of the ARM’s LDM and STM instructions?

What will be an ideal response?


The goal of classic RISC processors is one cycle per instruction (we will see in chapter 7 that this can be achieved by pipelining but is never actually achieved). Instructions that have multiple components such as stack manipulation (pointer changes and data access) or the movement of multiple registers does not fit into RISC philosophy of simple one?cycle operations. However, omitting block moves from the instruction set does leave a hole in the operational capability since block movement is such a common operation. Consequently, ARM has included this very valuable ISA addition.

The ARM processor’s basic load function is LDR r0,[r1] that loads the data in memory pointed at by r1 into register r2, and this is provided by all RISC processors. The ARM processor’s load multiple registers, LDM, has a more complex format with options for the addressing modes and options for the register list. One form is Here, the option IA (increment after) indicates that the stack pointer is going to be incremented after its use; that is, it is post?incrementing. The register list is specified by {}. In this case the register list specifies registers r3 to r7 inclusive, plus r9.

The LDM and STM instructions make the ARM processor much more like a conventional CISC processor as far as
the stack is concerned.

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Wireless network accessible in public locations A. print server II. Local printer that has the capabilities of a B. Wi-Fi hotspots network printer III. Facilitates communication with a computer in C. Remote Desktop another location Connection host IV. Computer that enables a local printer to be shared D. USB print server V. Remote computer that you want to control E. Remote Desktop Connection

Computer Science & Information Technology

If the user is accessing a shared folder on the computer where it exists, shared folder permissions apply

Indicate whether the statement is true or false

Computer Science & Information Technology

Tier 1 providers own long-distance, high-speed fiber-optic networks called ______________.

A. backbones B. connectors C. root servers D. telephones

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. If a word is marked as misspelled, you can right-click it to open a menu of suggested spellings, and then click the correct spelling on the menu. 2. Although you can change the symbol used for a bullet, you cannot change bullets to numbers. 3. In Slide Show view, you can see the next slide, speaker notes, and a timer, while your audience sees the current slide fill the screen on another monitor. 4. You can change the theme after you create a presentation. 5. If you want help finding a synonym for a word on a slide, you can use the thesaurus in PowerPoint.

Computer Science & Information Technology